Keylime

  • Main Site
  • Blog Home

 

 

  • A Hitchhikers Guide to Remote Attestation 🚧

    Let’s say you have servers somewhere far away, potentially hosted by your company or some other provider, but you sometimes wonder if you could ever fully trust that no one is doing anything sketchy on them. You may ask yourself, how can I prove that my machines have not been tampered with, or how can I prove that they are being tampered with? You may wonder how you can trust them. With Remote Attestation, you don’t have to wonder; you can use existing hardware solutions to prove that the machines can be trusted and are indeed in a secure state.

  • Overview of Keylimes Runtime Integrity Management

    A feature of Keylime is runtime integrity monitoring, using the integrity management architecture (IMA).

  • Human friendly logging date format

    Open /etc/keylime.conf

  • Handy Docker Environment for Local testing Development!

    The following is a guide to mounting your local repository as a Docker volume and performing a test run using a TPM simulator.